-
2
-
-
84868146127
-
-
ARM Limited Version 3.0 ARM PRD29-USGC-000089 3.1
-
ARM Limited: ARM TrustZone API Specification, Version 3.0 (2009), ARM PRD29-USGC-000089 3.1
-
(2009)
ARM TrustZone API Specification
-
-
-
3
-
-
84865678310
-
-
ARM Limited ARMv7-A and ARMv7-R edition, Errata Markup ARM DDI 0406B errata 2010 Q3
-
ARM Limited: ARM Architecture Reference Manual, ARMv7-A and ARMv7-R edition, Errata Markup (2010), ARM DDI 0406B errata 2010 Q3
-
(2010)
ARM Architecture Reference Manual
-
-
-
4
-
-
84865696527
-
-
developing for arm processors.pdf
-
ARM Ltd.: ARM compiler toolchain, http://infocenter.arm.com/help/topic/ com.arm.doc.dui0471c/DUI0471C developing for arm processors.pdf
-
ARM Compiler Toolchain
-
-
-
5
-
-
84865687031
-
-
Introduction online at primecell infrastructure amba3 tzpc bp147 to.pdf
-
ARM Ltd.: PrimeCell Infrastructure AMBA 3 TrustZone Protection Controller (BP147), Introduction online at: http://infocenter.arm.com/help/topic/com.arm. doc.dto0015a/DTO0015 primecell infrastructure amba3 tzpc bp147 to.pdf
-
PrimeCell Infrastructure AMBA 3 TrustZone Protection Controller (BP147)
-
-
-
6
-
-
84868095301
-
-
Introduction online at: tzasc tzc380 r0p0 trm.pdf
-
ARM Ltd.: TrustZone Address Space Controller (TZC-380), Introduction online at: http://infocenter.arm.com/help/topic/com.arm.doc.ddi0431b/DDI0431B tzasc tzc380 r0p0 trm.pdf
-
TrustZone Address Space Controller (TZC-380)
-
-
-
7
-
-
84865696526
-
-
Information online at
-
ARM Ltd.: Versatile Express Product Family (2011), Information online at: http://www.arm.com/products/tools/development-boards/versatile-express/index. php
-
(2011)
Versatile Express Product Family
-
-
-
8
-
-
85063636742
-
QEMU, a fast and portable dynamic translator
-
USENIX Association, Berkeley
-
Bellard, F.: QEMU, a fast and portable dynamic translator. In: Proceedings of the Annual Conference on USENIX Annual Technical Conference, ATEC 2005, p. 41. USENIX Association, Berkeley (2005), http://dl.acm.org/citation. cfm?id=1247360.1247401
-
(2005)
Proceedings of the Annual Conference on USENIX Annual Technical Conference, ATEC 2005
, pp. 41
-
-
Bellard, F.1
-
9
-
-
85037347577
-
Towards Permission-Based Attestation for the Android Platform - (Short Paper)
-
McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) Trust 2011 Springer, Heidelberg
-
Bente, I., Dreo, G., Hellmann, B., Heuser, S., Vieweg, J., von Helden, J., Westhuis, J.: Towards Permission-Based Attestation for the Android Platform - (Short Paper). In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) Trust 2011. LNCS, vol. 6740, pp. 108-115. Springer, Heidelberg (2011), http://dx.doi.org/10.1007/978-3-642-21599-5-8
-
(2011)
LNCS
, vol.6740
, pp. 108-115
-
-
Bente, I.1
Dreo, G.2
Hellmann, B.3
Heuser, S.4
Vieweg, J.5
Von Helden, J.6
Westhuis, J.7
-
10
-
-
14844295011
-
Direct anonymous attestation
-
ACM, Washington DC
-
Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 132-145. ACM, Washington DC (2004)
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
11
-
-
70349242410
-
Scheduling execution of credentials in constrained secure environments
-
ACM, New York
-
Ekberg, J.E., Asokan, N., Kostiainen, K., Rantala, A.: Scheduling execution of credentials in constrained secure environments. In: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, pp. 61-70. ACM, New York (2008), http://doi.acm.org/10.1145/1456455.1456465
-
(2008)
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008
, pp. 61-70
-
-
Ekberg, J.E.1
Asokan, N.2
Kostiainen, K.3
Rantala, A.4
-
12
-
-
74049124417
-
Trust in a small package: Minimized MRTM software implementation for mobile secure environments
-
ACM, New York
-
Ekberg, J.E., Bugiel, S.: Trust in a small package: minimized MRTM software implementation for mobile secure environments. In: Proceedings of the 2009 ACM Workshop on Scalable Trusted Computing, STC 2009, pp. 9-18. ACM, New York (2009), http://doi.acm.org/10.1145/1655108.1655111
-
(2009)
Proceedings of the 2009 ACM Workshop on Scalable Trusted Computing, STC 2009
, pp. 9-18
-
-
Ekberg, J.E.1
Bugiel, S.2
-
13
-
-
84855358190
-
ARM TrustZone as a Virtualization Technique in Embedded Systems
-
Frenzel, T., Lackorzynski, A., Warg, A., Härtig, H.: ARM TrustZone as a Virtualization Technique in Embedded Systems. In: Twelfth Real-Time Linux Workshop (October 2010)
-
Twelfth Real-Time Linux Workshop (October 2010)
-
-
Frenzel, T.1
Lackorzynski, A.2
Warg, A.3
Härtig, H.4
-
14
-
-
84865687713
-
-
Google Inc.
-
Google Inc.: Android OS (2011), http://www.android.com/
-
(2011)
Android OS
-
-
-
15
-
-
79952235927
-
Mobile Ticketing System Employing TrustZone Technology
-
IEEE Computer Society, Washington, DC
-
Hussin, W.H.W., Coulton, P., Edwards, R.: Mobile Ticketing System Employing TrustZone Technology. In: Proceedings of the International Conference on Mobile Business, pp. 651-654. IEEE Computer Society, Washington, DC (2005), http://dl.acm.org/citation.cfm?id=1084013.1084282
-
(2005)
Proceedings of the International Conference on Mobile Business
, pp. 651-654
-
-
Hussin, W.H.W.1
Coulton, P.2
Edwards, R.3
-
16
-
-
36049009700
-
E-Pass Using DRM in Symbian v8 OS and TrustZone: Securing Vital Data on Mobile Devices
-
Hussin, W.H.W., Edwards, R., Coulton, P.: E-Pass Using DRM in Symbian v8 OS and TrustZone: Securing Vital Data on Mobile Devices. In: International Conference on Mobile Business, p. 14 (2006)
-
(2006)
International Conference on Mobile Business
, pp. 14
-
-
Hussin, W.H.W.1
Edwards, R.2
Coulton, P.3
-
19
-
-
74049088382
-
On-board credentials with open provisioning
-
Kostiainen, K., Ekberg, J.E., Asokan, N., Rantala, A.: On-board credentials with open provisioning. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS 2009, pp. 104-115.
-
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS 2009
, pp. 104-115
-
-
Kostiainen, K.1
Ekberg, J.E.2
Asokan, N.3
Rantala, A.4
-
20
-
-
84865687032
-
-
New York
-
ACM, New York (2009), http://doi.acm.org/10.1145/1533057.1533074
-
(2009)
-
-
-
21
-
-
84865701590
-
-
June 23
-
Lackorzynski, A., Frenzel, T., Roitzsch, M.: D2.6 First Initial Proof of Concept for Trust-Enhanced Virtualisation System (June 23, 2009), http://www.tecomproject.eu/downloads/deliverables2009/TECOM-D02. 6-First-initial-proofof-concept-for-trust-enhanced-virtualization-system.pdf
-
(2009)
D2.6 First Initial Proof of Concept for Trust-Enhanced Virtualisation System
-
-
Lackorzynski, A.1
Frenzel, T.2
Roitzsch, M.3
-
22
-
-
70350639602
-
A PrivacyCA for Anonymity and Trust
-
Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. Springer, Heidelberg
-
Pirker, M., Toegl, R., Hein, D., Danner, P.: A PrivacyCA for Anonymity and Trust. In: Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. LNCS, vol. 5471, pp. 101-119. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5471
, pp. 101-119
-
-
Pirker, M.1
Toegl, R.2
Hein, D.3
Danner, P.4
-
23
-
-
84860709376
-
-
Santos, N., Raj, H., Saroiu, S., Wolman, A.: Trusted Language Runtime (TLR): Enabling Trusted Applications on Smartphones (2011)
-
(2011)
Trusted Language Runtime (TLR): Enabling Trusted Applications on Smartphones
-
-
Santos, N.1
Raj, H.2
Saroiu, S.3
Wolman, A.4
-
24
-
-
84863720695
-
Specification and Standardization of a Java Trusted Computing API
-
Toegl, R., Winkler, T., Nauman, M., Hong, T.W.: Specification and Standardization of a Java Trusted Computing API. Softw. Pract. Exper. (2011), http://dx.doi.org/10.1002/spe.1095
-
(2011)
Softw. Pract. Exper.
-
-
Toegl, R.1
Winkler, T.2
Nauman, M.3
Hong, T.W.4
-
25
-
-
84865697710
-
-
Version 1.2
-
Trusted Computing Group: TCG TPM Specification Version 1.2 (2011), https://www.trustedcomputinggroup.org/developers/
-
(2011)
TCG TPM Specification
-
-
-
26
-
-
85037135907
-
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
-
Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. Springer, Heidelberg
-
Wachsmann, C., Chen, L., Dietrich, K., Löhr, H., Sadeghi, A.-R., Winter, J.: Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 84-98. Springer, Heidelberg (2011), http://dx.doi.org/10.1007/978-3-642-18178-8-8
-
(2011)
LNCS
, vol.6531
, pp. 84-98
-
-
Wachsmann, C.1
Chen, L.2
Dietrich, K.3
Löhr, H.4
Sadeghi, A.-R.5
Winter, J.6
-
27
-
-
37149014768
-
Implementing Embedded Security on Dual-Virtual-CPU Systems
-
Wilson, P., Frey, A., Mihm, T., Kershaw, D., Alves, T.: Implementing Embedded Security on Dual-Virtual-CPU Systems. IEEE Design and Test of Computers 24(6), 582-591 (2007)
-
(2007)
IEEE Design and Test of Computers
, vol.24
, Issue.6
, pp. 582-591
-
-
Wilson, P.1
Frey, A.2
Mihm, T.3
Kershaw, D.4
Alves, T.5
-
28
-
-
70349253246
-
Trusted computing building blocks for embedded linux-based ARM trustzone platforms
-
ACM, New York
-
Winter, J.: Trusted computing building blocks for embedded linux-based ARM trustzone platforms. In: Proceedings of the 3rd ACMWorkshop on Scalable Trusted Computing, STC 2008, pp. 21-30. ACM, New York (2008), http://doi.acm.org/10.1145/1456455.1456460
-
(2008)
Proceedings of the 3rd ACMWorkshop on Scalable Trusted Computing, STC 2008
, pp. 21-30
-
-
Winter, J.1
-
29
-
-
84865683681
-
-
July 28 Public GIT repository at
-
Winter, J., Wiegele, P., Lipp, M., Niederl, A., et al.: Experimental version of QEMU with basic support for ARM TrustZone (source code repository) (July 28, 2011), Public GIT repository at: https://github.com/jowinter/qemu- trustzone
-
(2011)
Experimental Version of QEMU with Basic Support for ARM TrustZone (Source Code Repository)
-
-
Winter, J.1
Wiegele, P.2
Lipp, M.3
Niederl, A.4
-
30
-
-
79953117191
-
Trusted Wireless Sensor Node Platform
-
Ao, S.I., Gelman, L., Hukins, D.W., Hunter, A., Korsunsky, A.M. (eds.) Proceedings of the World Congress on Engineering, WCE 2010, London, U.K., June 30-July 2. International Association of Engineers, Newswood Limited
-
Yussoff, Y.M., Hashim, H.: Trusted Wireless Sensor Node Platform. In: Ao, S.I., Gelman, L., Hukins, D.W., Hunter, A., Korsunsky, A.M. (eds.) Proceedings of the World Congress on Engineering, WCE 2010, London, U.K., June 30-July 2. Lecture Notes in Engineering and Computer Science, vol. I, pp. 774-779. International Association of Engineers, Newswood Limited (2010)
-
(2010)
Lecture Notes in Engineering and Computer Science
, vol.1
, pp. 774-779
-
-
Yussoff, Y.M.1
Hashim, H.2
|